Contents

View vulnerable items on configuration items

SAVE AS PDF

View vulnerable items on configuration items

Software with a known vulnerability installed on your server (represented by a
Vulnerable Item) is a common reason that security incidents happen. If the Configuration
item (CI) in a security incident contains vulnerable items, there are two methods you can
use to view them.

Before you begin

Role required: sn.si_admin or sn.si_analyst

Procedure

Open a security incident.

If the Configuration item field shows a
Show related records [] icon, it indicates that the affected CI contains vulnerable
items.

Click the icon to view the list of all related records.

Click the Vulnerable items link to view the vulnerable
items for the affected CI.

You can also view the same list of vulnerable items by scrolling down and
clicking the Vulnerabilities on Configuration Items
related list.